Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp662331rwr; Wed, 3 May 2023 04:35:55 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ67o/lQRZt4cO5w7xaymQof8c4762a72N8eb9HY+i6WBMUQYNBczgRaKdms2yX04tzBbhjC X-Received: by 2002:a05:6a00:1142:b0:63d:255f:36f4 with SMTP id b2-20020a056a00114200b0063d255f36f4mr28786444pfm.3.1683113754609; Wed, 03 May 2023 04:35:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683113754; cv=none; d=google.com; s=arc-20160816; b=SfF+vkqBlL6f3BHeeiDUBMk61AkEvsNU4tFDS97EzBi1SKgXuVv2Lzn9JNOUaW7HaY wHKUW4G+i3KxDMVVoNCoMdE3Q9wfuv5u7HGZDKxFTClP8vWbToKKoIjYl79El7dq329M GsEKe64fG8Jel/jWH6aHqiqHvV30S50wWun3ZneFaofEVvN+BOyE+Er3EYoSkAb6WSS3 Eli7CSSt+uSMKruYI8m4FwVYq6FIjLdbp/vJQCt3XwIQB3+xB3VNkKdhH7nKd+mqjocZ 9d9cGanlrYT7NRatcPytmJq3ftZV+Dw3pgW3Q6y50M/nHIYP3326XbKvctcjvgy2b4O8 p2qw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=04C66NkHpIaK36BKkWo1xIGCdVJ8d5XamKir7enWzFM=; b=CikQcWYmkBNKiVQj1HyZq2qJ7klNFnpYvGfmdGsPtyXzhGG7unfwv8KjeUNip/n88E icFlrZhGp1NX1Z72TneIjs5fMJrUQ+soY+fazXFY6WksX4RHhS+KmsB4LqO8QAhLW/W0 jGdL5evpT/HlJyIvtPhlto5FJ+yj4v4bSxDpndcy1COj5jTbfte+lsM+cqbNT6oxyJco r2EroExAT1GIu1zwxB2Hjm7Cu/4vwfpOpWrzOOox0qah5EWAblfFo6WS4BSb39agFmpa D5MOXTeX87SNnIy50CoV5TiEj1Gx7L2z8j/5C37J20cn1sMrwAAQZj/ightkemA7cZll O5og== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=nMGM9ezc; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t14-20020aa7946e000000b0063b895e9781si33365476pfq.138.2023.05.03.04.35.35; Wed, 03 May 2023 04:35:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=nMGM9ezc; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229722AbjECLbe (ORCPT + 99 others); Wed, 3 May 2023 07:31:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44766 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229643AbjECLbd (ORCPT ); Wed, 3 May 2023 07:31:33 -0400 Received: from mail-wm1-x331.google.com (mail-wm1-x331.google.com [IPv6:2a00:1450:4864:20::331]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CB8C14C0D for ; Wed, 3 May 2023 04:31:31 -0700 (PDT) Received: by mail-wm1-x331.google.com with SMTP id 5b1f17b1804b1-3f315735514so19637605e9.1 for ; Wed, 03 May 2023 04:31:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1683113490; x=1685705490; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=04C66NkHpIaK36BKkWo1xIGCdVJ8d5XamKir7enWzFM=; b=nMGM9ezcPvHWMTCih9c2IuIeZ7MsFBKmLPFK+CzCwD55dEWkkJzP66TovjJI/l+BrR 39ovfcvLDY3uD4RgUu9FaorOgkvKvZjzkA3vdTr/tvOjGKJonbwY8zmT5WysJc5/Q/AZ JhsFImt1GZCaqmLP6mFf4l28bvdbjbpFMc2cvOLciAFHqzPe0dNdvbHBOgdKfJpP5X09 +yjcAdzaScFZ6FlY7fBgvK0xnjO4abirucsMMzk9XazOoHJ980ScVwXwEnOJUn7jOL1f 7Hwo43sao5if75Q025fvUVttAVh8kFkUrYyQmFa339YIiGzGp0RJTM5P6RLuYIeaLMlt 9bDw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683113490; x=1685705490; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=04C66NkHpIaK36BKkWo1xIGCdVJ8d5XamKir7enWzFM=; b=UHuV9fYzKN8siSOrvKwDX6/jnRpfEaWkIHiPIL7GKRMPhMUMsu0tK6qAJwIlnJEVQZ cCSx+TNJ4kZs9OzsFsvG4wdxZWo0TfiYDH9J/LSRqj7/0CXmxFLKouAxKLmEpf8N6QI6 KqsFSqJYDJ3fz9oalP3NfSc8o0vnKcG2kLW4UKB04VAi9V+BtrviOMwa2foXmgxWP7qW r4ysE/K84WAA0t7EHDLDEHh122hXt7MEZ+qAtt+osY3PKQNIVciOqhEwEjuIDNUnxsFu vvdBhiwwbUext4TJE4H1onhHZ/sSX64NvhAzgfAeGBQ/dHLCUrIXWsQ8Lb21cmfd1win pcWA== X-Gm-Message-State: AC+VfDyXHMwElhz6Uvr59XZxjQ5UF95cps+U41jaS/1K+SpHEQxA/Fi9 gDOdHwputjH5Gd3u4lBoQ3jClA== X-Received: by 2002:a1c:7915:0:b0:3f1:6880:3308 with SMTP id l21-20020a1c7915000000b003f168803308mr1454645wme.1.1683113490319; Wed, 03 May 2023 04:31:30 -0700 (PDT) Received: from localhost ([102.36.222.112]) by smtp.gmail.com with ESMTPSA id i6-20020a05600c290600b003f18992079dsm1588732wmd.42.2023.05.03.04.31.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 May 2023 04:31:28 -0700 (PDT) Date: Wed, 3 May 2023 14:31:23 +0300 From: Dan Carpenter To: Thadeu Lima de Souza Cascardo , Harshit Mogalapalli Cc: Trond Myklebust , Anna Schumaker , Chuck Lever , Jeff Layton , linux-nfs@vger.kernel.org Subject: Re: [PATCH] net: avoid double iput when sock_alloc_file fails Message-ID: <95e36d70-7841-4e7d-960a-116b8595b820@kili.mountain> References: <20230307173707.468744-1-cascardo@canonical.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230307173707.468744-1-cascardo@canonical.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org I changed the CC list from netdev to linux-nfs. On Tue, Mar 07, 2023 at 02:37:07PM -0300, Thadeu Lima de Souza Cascardo wrote: > When sock_alloc_file fails to allocate a file, it will call sock_release. > __sys_socket_file should then not call sock_release again, otherwise there > will be a double free. > It's just a one liner to make Smatch warn about these sorts of user after free bugs. { "sock_release", PARAM_FREED, 0, "$" }, Smatch found a related bug in nfs. net/sunrpc/svcsock.c:938 svc_tcp_accept() warn: 'newsock' was already freed. net/sunrpc/svcsock.c:1633 svc_create_socket() warn: 'sock' was already freed. net/sunrpc/svcsock.c:1555 svc_addsock() error: dereferencing freed memory 'so' net/sunrpc/svcsock.c:1633 svc_create_socket() warn: passing freed memory 'sock' net/sunrpc/svcsock.c:938 svc_tcp_accept() warn: passing freed memory 'newsock' I guess the svc_setup_socket() function should free sock on every error path? It seems kind of gnarly. I fixed another sock_release() double free in xen that was simpler. regards, dan carpenter